Business Processes in a Distributed Surveillance System Integrated Through Workflow
|
|
- Samuel Claud Banks
- 8 years ago
- Views:
Transcription
1 AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 Piotr Szwed*, Wojciech Chmiel*, Stanis³aw Jêdrusik*, Piotr Kad³uczka* Business Processes in a Distributed Surveillance System Integrated Through Workflow 1. Introduction SIMPOZ (System of Intelligent Monitoring of Objects and Areas of Special Importance) project aims at building a highly configurable system for surveillance of public areas and objects of a special importance based on the analysis of digital images. Development of dedicated software supporting automation of surveillance tasks is not a trivial issue, due to the fact that events or conditions, which the system should detect may occur in multiple unpredictable variants [9]. The goal of the intelligent monitoring system is to alert an operator about potentially suspicious situations according to assumed safety criteria. An important element of the system is software that exploits recent results of research on image understanding [13]. It is planned to build a unified hardware-software platform that will allow to process and send video signal and to generate, handle and document alarms. Such system requires an efficient integration of components and flexible management of information obtained from supervised areas (originating from various types of detectors: video, audio and thermovision). The approach adopted in the SIMPOZ architecture assumes that integration tasks will be performed by a workflow management system. Its role is to integrate heterogeneous devices (such as cameras, microphones, mobile phones, computers, network and signalling devices) with external systems (databases, existing access control systems) into a homogeneous safety management system. Main premises for using a workflow-type system is a distributed nature and potential diversity of monitoring features, a large number of alarm signals fed by various sensors (external events), the need to ensure a flexible event flow management and tailored to needs emergency response processes. It should be stressed that application of workflow system is a novel approach to security management, not having analogues the existing systems in the world. * AGH University of Science and Technology, Krakow, Poland ** Project sponsored by MNiSW and NCBiR under contract No. 128/R/t00/2010/12 115
2 116 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka Workflow processes in SIMPOZ system are defined in the XPDL (XML Process Definition Language) language [4] recommended by the Workflow Management Coalition (WfMC). The XPDL is considered worldwide as a standard in the field of workflow specification. Due to the large number of elements occurring in surveillance systems (both software and hardware), their variety and complicated dependencies. it was found necessary to document system functions, processes and architecture using an easy in perception language supporting direct communication with stakeholders (clients). The language is used for developing abstract specifications, most preferably, allowing an inclusion of salient system aspects already at the business analysis stage. The ArchiMate language [1] seems to be the most suitable for this purpose. ArchiMate allows creating descriptions (views) at the business, application and technological layer levels using a rich set of expressive constructs. The paper presents examples of business models developed with ArchiMate language. They reflect the specificity and characteristics of surveillance systems: reactive character, event driven control, a large number of asynchronous data flows and a frequent requirement of bidirectional communication between detection modules and a system operator. Fig. 1. The operational concept of the system Figure 1 depicts the operational concept of the system and the links between its elements. In the center of the figure a management module is shown; it is responsible for communication and synchronization of all system components and supervision of currently running processes; these functionalities are provided by a workflow management system. Detection modules perform surveillance tasks, i.e. they: detect potentially dangerous objects in the supervised areas, nonstandard (considered as dangerous) behavior and violen-
3 Business Processes in a Distributed Surveillance System Integrated Through Workflow 117 ce of restricted zones. They also extrapolate trajectories (speed and direction) of motion of observed objects, etc. Each of the detection modules have certain degree of freedom in communicating with the surveillance system using specialized interfaces designed in line with SOA (Service Oriented Architecture) approach. Information about an event detection triggers appropriate response procedures (specified in XPDL language) executed by a workflow engine. Operator interface gives access to security related information, which comes from various types of detectors and running processes. In the case, when a suspicious situation is detected or an alarm generated, information about the event is passed to the operator. The operator can also communicate with intervention groups and other parties. In order to better assess the situation, he or she can access current and archive video streams. Interface of signaling devices enable processes managed by workflow system to communicate with these devices and building automation systems (i.e. sirens, displays, emergency exit, illumination, floodgate, HVAC, etc.). Interface of internal communication enables different intervention groups to communicate via various mobile devices. Its main functions are sending confirmation of the call reception, reporting current status of the intervention and communication with an operator and other actors. External communication interfaces allow for sending automatic notification to emergency services (police, army, fire department) relevant to the detected danger. They also provide access to archival materials (video, intervention reports) to external systems. The reporting interface provide access to the database of intervention reports and can be used to generate analytical reports on the basis of the history of events. It also provides entry points for processes that supervise reporting procedures (creation, modification, deletion). The database stores recorded history of performed processes for later review. The adopted model assumes that types of events, time of their occurrence, decisions taken by executors and exchanged messages are recorded. 2. Review of surveillance systems Advanced identification and recognition systems are developed mainly by foreign companies. The Bosch IVA (Intelligent Video Analysis) security system is a leader in this field [5]. Bosch IVA is a comprehensive solution designed for conducting intelligent video surveillance. Basic types of hardware used in the systems are IP cameras as well as VIP X1600 and VideoJet X servers. IVA supports all basic functions of intelligent surveillance. Moreover, it allows to define sophisticated surveillance scenarios. IVA also includes alarm transmission subsystem and centralized management. The software is running on PC class
4 118 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka computers. Received alert generates events that highlight a monitor, enlarge the image, automatically display an image preview of selected camera or run an appropriate procedure. Bosch VMS (Video Management System) provides complete surveillance, management of video signals and alarms handling. Alarms coming from IVA system are combined with general motion detection alarms. VMS system allows combining specific alarming conditions and ordering them according to their importance, resulting in possibly complex rules to manage emergency scenarios. An important system feature is, that alarms history is saved in a register, which facilitates finding the desired information in recorded video material. Bosch has developed its own system for searching events in the database called Forensic Search. IndigoVision company [7] provides tools supporting integration and management of alarming systems. Its solutions allow centralized management of distributed monitoring systems through automated handling of alarms detected anywhere in supervised areas. The system allows for defining responsibilities for performing alarm responses and assigning them to registered users. The advantage of this solution is integration of alarms detected by many types of sensors. The system allows an integration of alarm zones (only one alarm is generated in a given area despite detection of events by many sensors), the localization of alarms, automatic forwarding and escalation of alarms, setting up emergency procedures integrated with illumination and automation and creating reports. Another mature solution is VMS (Video Management System) system created by Mirasys Carbon company [10]. It is highly scalable and provides efficient analysis tools that allows an easy and intuitive handling of thousands of videocassette recorders and cameras. The system supports a centralized management of user profiles, constant monitoring of system status and generation of alarms associated with a hardware failure. An important feature of the system is the ability to define the procedures for handling registration and reporting of alarms. The analytical platform is open and can be integrated with any other video analysis software. Moreover, meta-data can be easily searched in databases containing historical data. Integration is based on an open-gateway solution. This allows combining already existing heterogeneous surveillance systems and integration with LDAP service. In turn, Axis Company offers and promotes decentralized systems which perform essential calculations on cameras [3]. A key feature of this approach is free of charge, open standard to support network cameras (Axis network cameras VAPIX). This allows not only to create own applications for intelligent video analysis, but also simplifies the development of a surveillance system, as the standard includes ready-to-use solutions. Camera Application Platform allows to develop client software, which then can be used with network cameras and video encoders from Axis Company. System of Securiton company [11] is equipped with functions of location and georeferenced positioning of objects and 3D technology. The company may deliver specialized
5 Business Processes in a Distributed Surveillance System Integrated Through Workflow 119 modules upon client request. IPS-Outdoor is a high quality video surveillance system for monitoring people and objects in outdoor areas. IPS-Indoor allows to track simultaneously up to 50 objects inside buildings. ISP-Subway, in turn, is dedicated for monitoring subways. It detects graffiti painting and loitering behavior. Apart from delivering locations of objects, it visualizes objects trajectories, also on large maps (geo-reference). This allows to easily track moving objects by different cameras in outdoor areas. The Verint company [14] has developed Nextiva PSIM Actionable Intelligence system that integrates a large number of detectors, introducing mechanisms, which simplify system management, increase the effectiveness of protection and optimize costs. The result of information processing is broadcast to users as well as other modules. The latter automatically identify dangerous situations. The system reduces time to initiate a response, provides tools for response management and effective cooperation with local security forces (police, fire department). Solutions provided by PSIM platform are scalable and are based on an open architecture. They include PSIM scenario generator that allows define scenarios launched in case of such events, as: explosion, flood, aggressive crowd behavior or gas leak. Execution of procedures is controlled through control lists. Visualization of the latter helps the staff to handle them. The system includes also built-in tools to supporting reporting. Other solutions are provided by companies such as Sanyo, GeoVision and Ganz. Presented solutions have a long market history, they are technologically mature, however, they lack from fully process oriented approach. Hence, they do not allow for flexible modification of surveillance procedures without a deep system redesign. Available solutions are rarely based on the SOA paradigm, which recently was recognized as a leading approach in integration of heterogeneous and distributed systems. 3. Workflow systems and XPDL language XPDL (XML Process Definition Language) is an XML based language for definition of workflow processes. Originally, it was designed as a format (standardized by Workflow Management Coalition) to store and exchange definitions of business processes between different modeling tools and/or workflow engines. However, because of its high expressiveness, XPDL is used in practice as a business process execution language. The core element of XPDL language is activity. It represents a working unit that can be realized by a specified resource and/or external application. Activity can be executed automatically or manually. The undoubted advantage of the XPDL language, starting with the first version, is a flexible model of resources assigned to an activity. This allows for both static and dynamic allocation of resources. In addition, each activity can operate on data which are defined within a process or can refer to external resources.
6 120 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka The XPDL language distinguishes several types of activities. These are, inter alia: (i) Route activity which models decision, fork, join and synchronize nodes, (ii) Subflow activity which models subprocesses, (iii) Block activity which allows to treat a part of a process as a separate activity without creating a new subprocess, (iv) Event activity which models behaviors related to sending and receiving messages, (v) No Implementation activity which models behaviors not supported by a workflow system and (vi) Task activity which, generally, models collaboration with external applications/systems. The specifications in XPDL language can be expanded by so-called extended attributes that can be assigned to almost any element. An extended attribute is defined as a keyvalue pair. Its semantics can be arbitrarily defined by software developers. In practice, extended attributes are used most often to store values of parameters specific to a given solution. However, they can be used to extend syntax and semantics of XPDL language without changing the language specification. 4. ArchiMate language ArchiMate [1, 2] is a contemporary, open and independent language of enterprise architecture description. It includes three modeling layers: business, application and technology. The advantage of the ArchiMate is that it gives a comprehensive overview of the whole enterprise architecture. The business layer includes business processes and objects processed by them, functions, events, roles and services. The application layer includes components, interfaces, application services and data objects. Finally, the technology layer contains such elements as artifacts, nodes, software, devices, communication channels and networks. ArchiMate allows to present an architecture in the form of views which, depending on the needs, can include only items in one layer or can show vertical relations between layers (e.g.: the relationship between business activity and function of the component software). ArchiMate language was built in opposition to UML [6], which can be seen as a collection of unrelated diagrams, and BPMN [4] which covers mainly behavioral aspect of enterprise architecture. The definition of a language has been accompanied by the assumption, that in order to build an expressive business model, it is necessary to use the relationships between completely different areas, starting from business motivation to business processes, services and infrastructure. ArchiMate goes beyond UML [8]: it defines a metamodel on the basis of which a user can create and illustrate the relationships between elements of different layers. The subsequent sections present the views of the ArchiMate model limited to business layer. However, the decision of using this language in the project also includes documentation of lower layers: application and technology.
7 Business Processes in a Distributed Surveillance System Integrated Through Workflow SIMPOZ system functions The modeling approach applied here considers a function as a collection of processes. These processes can be flexibly combined through the events mechanism (e.g., after an operator approves an alarm, alarm identification process generates an event that initiates a response process; a response process triggers next event which is responsible for communication with external police services, etc.). The above mechanism of dynamic composition of processes is used for translation of descriptions of business processes to executable XPDL language. Fig. 2. SIMPOZ platform functions Figure 2 presents the general overview of system functions. They include: Alarm identification: processes of events detection and classification, aiming at assessing that an alarm is founded or rejecting it. Response: processes in this group aim to coordinate the response to events. Reporting: notification of all alarms, creating reports and statistical summaries for subscribed parties. Informing passengers: broadcasting information about items left, managing evacuations and opening restricted areas to public use. Cooperation with external services: covers processes directing requests to police, medical services, fire department and processes providing access to digital evidence materials (video recordings). Processes in functions are divided into three groups: core processes controlled by a workflow management system, management processes carried out using dedicated software and support processes or services.
8 122 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka The examples of processes in the Response function, divided into three groups, are summarized in Table 1. Table 1 Groups of processes in the function Response Core processes Management processes Supporting processes R1. Takeover of an object violating a restricted zone R2. Response to identified bomb threat (detection of a suspicious stationary object in restricted area) R3. Response to dangerous behavior of a single person R4. Response to untypical/dangerous behavior of a group R5. Response to detection of moving object with colliding trajectory R6. Guarding tour RM1. Intervention group management (defining groups and their members) RM2. Defining schedules of tasks for groups RM3. Defining schedules of operators work (shifts) RM4. Defining schedules of guarding tours RS1. Storing reports and history of intervention in a repository RS1. Storing text and/or voice messages sent during intervention RS1. Storing recordings of operator s calls 6. Event-oriented model of the process This section presents one of the processes in the Response function: Takeover of an objects violating a restricted zone. It was chosen as an example, because its flow includes communication patterns and shows more complex courses of interaction between two roles: Operator and Intervention group(s). Specification of business processes within SIMPOZ project is prepared in two equivalent forms: narrative and graphical. Textual descriptions are made based on a template usually recommended for use cases. The template specifies goals, performers, a triggering event and pre- and post-conditions. In the case of the presented process, the goal is to coordinate the response to the event in order to take over the object violating a zone. The process is triggered by an emergence of the event Alarm zone violation generated in Alarm identification function. The postconditions are defined as successful object takeover ( failed object takeover ) and require, that intervention history records are present in a repository. The model of the Takeover of an object violating a restricted zone process is in fact a collection of subprocesses whose names (see Fig. 3) correspond to numbering in the scenario. The figures present only a partial specification. The considered process consists of nine subprocesses. Each of them starts and ends with an event. For example, the main
9 Business Processes in a Distributed Surveillance System Integrated Through Workflow 123 subprocess in Figure 3 starts after reception of external triggering event (Alarm zone violation) and ends with one of the events: R1 Terminate (internal event) or To the police take the detainee (event passed to another function). Fig. 3. Main flow of intervention process In the adopted model (and the executive system), the Terminate event has a special semantics. It terminates all instances of the process and its child subprocesses and removes unhandled event from the system queues. The internal event STOP shown in Figure 4 terminates only a given subprocess. The event R1 Request for support can be generated and received during an occurrence of the activity Localize and takeover the object, what is depicted in Figure 4 by the appropriate association. As a result of its handling (Fig. 4), the request can be rejected, which ends the child process, the event requesting support can be generated or the main process can be recursively called through the generation of the event Alarm zone violation. Figure 5 shows the process of handling of the internal event No contact with the group. The R1 waiting time T1 elapsed event is a typical construction for expressing time requirements. If the deadline is not met, the main process is called recursively. The last of the sub-processes, shown in Figure 6, describes reactions to events that informs of movements of object and the intervention group, coming from tracking process in Alarm identification function (the presence of the intervention group in the supervised sectors changes the mode of operation of functions monitoring zone violation).
10 124 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka Fig. 4. Recursive call of the main process by sending the event Alarm area violation Fig. 5. Timeout detection (events generated as a result of not meeting deadline) Fig. 6. Process controlling the changes of surveillance modes in the sectors in which an intervention group is displacing The remaining subprocesses include among others: handling of operator s decision (completion of the intervention, assignment of a support, calling external services) and re-
11 Business Processes in a Distributed Surveillance System Integrated Through Workflow 125 gistration of the course of the intervention. Several subprocesses are defined in order to react to special events such as disappearance of the object in the supervised area or remaining of the object in a restricted zone without possibility of taking it over (the process terminates when intervention is taken by police services). It is worth noting, that all the events and decisions in the implemented system are registered. Registration of the decision is defined at the process specification level and registration (auditing) of events is a built-in function of the executive platform. The presented examples demonstrate the complexity of the surveillance systems processes. On one hand, these processes presented in a decomposed form inspired by patterns from EPC [12] language seem relatively simple. On the other hand, it should be remarked that only selected subprocesses of a larger single process are presented. Their instances can be dynamically created by events generation, hence an integrated process resulting from their composition can be perceived as a very complex. The ArchiMate language, in contrary to, e.g., BPMN, has no defined semantic. In spite of the smaller set of dedicated behavioral constructs, after adopting a certain convention, it can be used to express similar aspects of system behavior. Events STOP, Terminate or time events correspond in fact to BPMN events. Gathered experience indicates, that properly used constructs of the ArchiMate language allow obtaining high level of expressiveness. At the same time, the undoubted advantage of the language is the ability to combine elements of different architecture layers, business, application, and technical support, in one coherent model. This allows keeping consistency between the business and the application models and documenting implementation at the level of the technical infrastructure. 7. Conclusions The main purpose of this paper is to present principles of modeling of business processes in distributed surveillance systems that were applied in the case of SIMPOZ system. The developed distributed surveillance platform is integrated through a workflow system which is an innovative element with respect to other solutions found on the market. The experience acquired during the project realization justify the finding that the business modeling phase is essential for this class of systems and may strongly influence quality of project outcomes. It is important, however, to appropriately select tools, which in further stages will be used to describe various aspects of the analyzed system. Constructs offered by the ArchiMate language are sufficiently expressive to describe event orientation in workflow processes, assignment of performers to operations, manipulation of data, distinguishing types of components, documenting interfaces and system devices. These features proved particularly useful to define interfaces of modules and encoding processes using XPDL language. The experience acquired from business analysis of SIMPOZ system may, in a long term perspective, result in development of tools supporting automatic translation of Archimate diagrams to XPDL language.
12 126 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka References [1] Archimate 1.0 Specification, The Open Group, , pp [2] Archi, Archimate Modelling Tool, [3] Axis (2012), Axis Comm. AB: [4] Business Process Modeling Notation Specification. Version 1.2, January 2009, OMG Document [5] Bosch (2012) Intelligent Video Analysis (IVA) [6] Fowler M., UML Distilled. 3rd ed. Addison-Wesley [7] IndygoVision, [8] Malik N. (2009), Will there be a battle between Archimate and the UML?, b/nickmalik/archive/2009/04/17/will-there-be-a-battle-between-archimate-and-theuml.aspx. [9] Mikrut Z., Tadeusiewicz R., Sieci neuronowe w przetwarzaniu i rozpoznawaniu obrazów. [in:] Biocybernetyka i In ynieria Biomedyczna 2000, t. 6, Sieci Neuronowe, AOW EXIT, Warszawa 2000, pp [10] Mirasys Carbon VMS: [11] Securiton AG, [12] Scheer A.-W., ARIS Business Process Modeling, Springer, [13] Tadeusiewicz R., Ogiela M., Szczepaniak P., Notes on a Linguistic Description as the Basis for Automatic Image Understanding. Applied Mathematics and Computer Science 19(1), 2009, pp [14] Verint Systems Inc.,
White paper. Axis Video Analytics. Enhancing video surveillance efficiency
White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network
More informationWhite paper. Axis Video Analytics. Enhancing video surveillance efficiency
White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network
More informationMM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.
MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety
More informationBusiness Process Modeling and Standardization
Business Modeling and Standardization Antoine Lonjon Chief Architect MEGA Content Introduction Business : One Word, Multiple Arenas of Application Criteria for a Business Modeling Standard State of the
More informationProduct Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6
Data Sheet savvi Version 5.3 savvi TM is a unified video analytics software solution that offers a wide variety of analytics functionalities through a single, easy to use platform that integrates with
More informationBuilding Integration System Selection Guide for V4.0
Building Integration System Selection Guide for V.0 Building Integration System Contents Contents System overview... Typical applications... Connection types and licensing basics... 6 Selection Guide
More informationMerchandising Security Customer Satisfaction. Business Intelligence for the. Retail Sector. V i d e o A n a l y t i c s
Merchandising Security Customer Satisfaction Business Intelligence for the V i d e o A n a l y t i c s Retail Sector VCA Technology video analytics is capable of multi-tasking. Depending on the field of
More informationIntegrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
More informationINTELLECT TM Software Package
AxxonSoft INTELLECT TM Software Package Quick Start Guide Version 1.0.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Intellect software package...
More informationBuilding Integration System Your platform for customized security and safety management
A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards
More informationSOA Enabled Workflow Modernization
Abstract Vitaly Khusidman Workflow Modernization is a case of Architecture Driven Modernization (ADM) and follows ADM Horseshoe Lifecycle. This paper explains how workflow modernization fits into the ADM
More informationIP Video Surveillance
IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access
More informationVisioWave TM. Intelligent Video Platform (IVP) Smart Scalable Open. Optimized for high-performance, mission-critical digital video surveillance
GE Security VisioWave TM Intelligent Video Platform (IVP) Optimized for high-performance, mission-critical digital video surveillance Smart Scalable Open Take a good look at VisioWave TM IVP You ll watch
More informationThe Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution
More informationAdvanced Network Video And Alarm Management Suite
Advanced Network Video And Alarm Management Suite ViMS. Advanced Network Video & Alarm Management Suite G anz ViMS Command is a powerful IP network based, open standards Video & Alarm Management software
More informationNext Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform
Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management
More informationTHE SIMULATION OF SOFTWARE PROCESSES IN THE INTEGRATED COMPUTER ENVIRONMENT IN THE CASE OF TELCO SECTOR
THE SIMULATION OF SOFTWARE PROCESSES IN THE INTEGRATED COMPUTER ENVIRONMENT IN THE CASE OF TELCO SECTOR Jerzy Roszkowski, Andrzej Kobylinski 2 Management Systems Consulting, Poznanska 28/, 93-34 Lodz,
More informationBusiness Process Management with @enterprise
Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase
More informationRFID System Description for Logistics & Inventory
RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.
More informationAxis network cameras A wide portfolio of products for professional video surveillance.
Axis network cameras A wide portfolio of products for professional video surveillance. The market s widest range of network cameras The video surveillance market is thriving, driven by increased public
More informationA Study on Integrated Security Service Control Solution Development about CRETA Security
A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,
More informationLOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
More informationAsset Tracking System
Asset Tracking System System Description Asset & Person Tracking 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and
More informationRIVA Megapixel cameras with integrated 3D Video Analytics - The next generation
RIVA Megapixel cameras with integrated 3D Video Analytics - The next generation Creating intelligent solutions with Video Analytics (VCA- Video Content Analysis) Intelligent IP video surveillance is one
More informationBuilding Integration System Your platform for customized security and safety management
Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more
More informationEMEREC. Information management for emergency crews.
EMEREC Information management for emergency crews. Rosenbauer EMEREC New screen New screen IT solutions from Rosenbauer For more than 140 years, the Rosenbauer name has been synonymous with ground-breaking
More informationUSAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT
TOTAL LOGISTIC MANAGEMENT No. 2 2009 PP. 5 13 Bartłomiej GAWEŁ, Anna PILCH USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT Abstract: The growth of efficiency in supply chain management depends on the
More informationEfficient BPMN: from Anti-Patterns to Best Practices
Efficient BPMN: from Anti-Patterns to Best Practices Architecture Made Simple Kristina Bigelienė, No Magic Europe About Speaker Kristina Bigelienė kristina.bigeliene@nomagic.com Solution Architect for
More informationAxxonSoft Inc. Axxon Smart. Quick Start Guide. AxxonSoft. The. Axxon Smart. Software Package. Quick Start Guide. Version 1.0
AxxonSoft The Axxon Smart Software Package Quick Start Guide Version 1.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Axxon Smart software package...
More informationDeploying VSaaS and Hosted Solutions Using CompleteView
SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems
More informationMethods for Lawful Interception in IP Telephony Networks Based on H.323
Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering
More informationGuarded community solutions Easy Series for villa and apartment projects
Guarded community solutions Easy Series for villa and apartment projects 2 Easy Series Control Panel Making security easy and reliable Add value to your innovative real-estate projects Ambitious apartment
More informationUsing UML Part Two Behavioral Modeling Diagrams
UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,
More informationA process model is a description of a process. Process models are often associated with business processes.
Process modeling A process model is a description of a process. Process models are often associated with business processes. A business process is a collection of related, structured activities that produce
More informationOur focus is innovating security where you need it most
Our focus is innovating security where you need it most Cameras which trigger alarms and alert you when needed 2 Cameras which trigger alarms and alert you when needed Cameras which trigger alarms and
More informationPIE. Internal Structure
PIE Internal Structure PIE Composition PIE (Processware Integration Environment) is a set of programs for integration of heterogeneous applications. The final set depends on the purposes of a solution
More informationThe Concept of Automated Process Control
Scientific Papers, University of Latvia, 2010. Vol. 756 Computer Science and Information Technologies 193 203 P. The Concept of Automated Process Control Ivo Oditis 1, Janis Bicevskis 2 1 Bank of Latvia,
More informationGRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING
MEDIA MONITORING AND ANALYSIS GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING Searchers Reporting Delivery (Player Selection) DATA PROCESSING AND CONTENT REPOSITORY ADMINISTRATION AND MANAGEMENT
More informationIRA 423/08. Designing the SRT control software: Notes to the UML schemes. Andrea Orlati 1 Simona Righini 2
Designing the SRT control software: Notes to the UML schemes Andrea Orlati 1 Simona Righini 2 1 - I.N.A.F. Istituto di Radioastronomia. 2 Dip. Astronomia - Università degli Studi di Bologna. Dicembre 2008
More informationInnovative approach to security solutions
> > > > > Innovative approach to security solutions www.tehnomobil.eu/solutions This is why we in Tehnomobil believe that security starts long before the first smoke detector, card reader or camera is
More informationPhysical Security Information Management
Physical Security Information Management Timely and Efficient Situation Management Using Data Fusion, Rules and Workflows, and Simulation with 3-D Modeling July 2011 Table of Contents Executive Summary...
More informationD-Link, the D-Link logo, and D-ViewCam are trademarks or registered trademarks of D-Link Corporation or its subsidiaries in the United States and
Remotely Managed Internet Cameras Deliver Low-Cost IP Surveillance Monitoring and Automation White Paper Abstract Internet Protocol cameras (IP cameras) enable anyone with access credentials and a standard
More informationIntelligent Monitoring Software. IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432
Intelligent Monitoring Software IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432 IMZ-RS400 Series Reality High Frame Rate Audio Support Intelligence Usability Video Motion Filter Alarm
More informationHoneywell Video Analytics
INTELLIGENT VIDEO ANALYTICS Honeywell s suite of video analytics products enables enhanced security and surveillance solutions by automatically monitoring video for specific people, vehicles, objects and
More informationAutonomy Consolidated Archive
Autonomy Consolidated Archive Dennis Wild Director SME, Information Governance and Archiving POWER PROTECT PROMOTE Meaning-Based Governance Files IM Audio Email Social Video SharePoint Archiving = Gain
More information7. Classification. Business value. Structuring (repetition) Automation. Classification (after Leymann/Roller) Automation.
7. Classification Business Process Modelling and Workflow Management Business value Lecture 4 (Terminology cntd.) Ekkart Kindler kindler@upb.de Structuring (repetition) Automation UPB SS 2006 L04 2 Classification
More informationProcess Modeling using BPMN 2.0
Process Modeling using BPMN 2.0 This chapter provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes
More informationIntroducing your Intelligent Monitoring Software. Designed for security.
Introducing your Intelligent Monitoring Software. Designed for security. RealShot Manager Advance www.sonybiz.net/videosecurity Simple, flexible and scalable HD-ready Intelligent Monitoring Software from
More informationScalability is the best solution. The new Social Alarm Management System 7 Professional.
Scalability is the best solution. The new Social Alarm Management System 7 Professional. 2 Efficiency through customising Ideal solutions for your success To ensure immediate responses to emergency calls,
More informationComplete IP Video Security Solutions
Complete IP Video Security Solutions www.indigovision.com About Us First security project World s first NVR The IndigoVision Network Video Recorder (NVR) is introduced to the Security Market. World s first
More informationEnterprise Storage Manager. Managing Video As A Strategic Asset November 2009
Enterprise Storage Manager Managing Video As A Strategic Asset November 2009 Table of Contents About Verint Video Intelligence Solutions... 1 About Verint Systems... 1 Preface: The Significance of Video
More informationPRICE LIST (EUR) July 2015
PRICE LIST (EUR) July 2015 20.07.2015 1. Terms and Conditions Validity This price list is valid from July 20 th 2015 on and it will be replaced by any newer SeeTec price list. The price list applies to
More informationOur mission is to develop and to offer innovative customer interaction.
www.nixxis.com Copyright 2011 Nixxis Group All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. Approach Today s business world is facing two
More informationPRODUCT Synergy Security Management System
Synergy Security Management System Video Integration, Command & Control Solution Synergy Security Management System Command and Control Synergy Security Management System SYNERGY FEATURES Comprehensive
More informationAxis IP surveillance. Endless possibilities for video surveillance.
Axis IP surveillance. Endless possibilities for video surveillance. The video surveillance market is growing constantly, driven by increased public and private security concerns, as well as a technology
More informationSERENITY Pattern-based Software Development Life-Cycle
SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies
More informationREQUEST FOR PROPOSAL Website Design and Development. DUE DATE: FEBRUARY 19, 2016-12:00 p.m.
REQUEST FOR PROPOSAL Website Design and Development DUE DATE: FEBRUARY 19, 2016-12:00 p.m. City of Willow Park 516 Ranch House Rd. Willow Park, Texas 76087 (817) 441 7108 www.willowpark.org Inquiries Inquiries
More informationMilestone Integration Platform Software Development Kit 2 (MIP SDK 2)
Milestone Integration Platform Software Development Kit 2 (MIP SDK 2) Agenda Introduction to MIP and MIP SDK What s new in MIP SDK 2 Summary Q&A Typical security infrastructure Point-of-sale (POS) Access
More informationSTATE-OF-THE-ART FLAME, SMOKE AND INTRUSION VIDEO DETECTION TECHNOLOGY FIRE DETECTION AND VIDEO SURVEILLANCE
STATE-OF-THE-ART FLAME, SMOKE AND INTRUSION VIDEO DETECTION TECHNOLOGY FIRE DETECTION AND VIDEO SURVEILLANCE STATE-OF-THE-ART FIRE DETECTION AND VIDEO SURVEILLANCE Due to the inherent nature of their design,
More informationW H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier
W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...
More informationA business view for NGN service usage
A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks
More informationRedefining Security for the Modern Facility
Redefining Security for the Modern Facility TM Make the most of your energy 02 Protecting your people, property and data 03 Trust your facilities to a leader in security systems The world is changing rapidly.
More informationOMG releases BPMN 1.1 - What's changed?
OMG releases BPMN 1.1 - What's changed? (revised version as of April 2008) Gero Decker 1 and Torben Schreiter 2 1 Hasso Plattner Institute, Potsdam, Germany 2 inubit AG, Berlin, Germany Abstract The Business
More informationALCATEL-LUCENT ENTERPRISE OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS
ALCATEL-LUCENT ENTERPRISE OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS In healthcare, education, high-risk industries and the hospitality sector, you must know immediately if
More informationsecure intelligence collection and assessment system Your business technologists. Powering progress
secure intelligence collection and assessment system Your business technologists. Powering progress The decisive advantage for intelligence services The rising mass of data items from multiple sources
More informationEMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white
More informationSERVICE ORIENTED ARCHITECTURE
SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the
More informationUPROM Tool: A Unified Business Process Modeling Tool for Generating Software Life Cycle Artifacts
UPROM Tool: A Unified Business Process Modeling Tool for Generating Software Life Cycle Artifacts Banu Aysolmaz 1 and Onur Demirörs 2 1, 2 Informatics Institute, Middle East Technical University, Ankara,
More informationIFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
More informationA Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
More informationProcess Modeling Notations and Workflow Patterns
Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros
More informationTAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility
TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies
More informationArchitectural view model for an integration platform
Journal of Theoretical and Applied Computer Science Vol. 6, No. 1, 2012, pp. 25-34 ISSN 2299-2634 http://www.jtacs.org Architectural view model for an integration platform Tomasz Górski Military University
More informationMonitoring BPMN-Processes with Rules in a Distributed Environment
Monitoring BPMN-Processes with Rules in a Distributed Environment Lothar Hotz 1, Stephanie von Riegen 1, Lars Braubach 2, Alexander Pokahr 2, and Torsten Schwinghammer 3 1 HITeC e.v. c/o Fachbereich Informatik,
More informationChallenges and Opportunities for formal specifications in Service Oriented Architectures
ACSD ATPN Xi an China June 2008 Challenges and Opportunities for formal specifications in Service Oriented Architectures Gustavo Alonso Systems Group Department of Computer Science Swiss Federal Institute
More informationMotorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost
Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations
More informationChange Pattern-Driven Traceability of Business Processes
Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I,, March 12-14, 2014, Hong Kong Change Pattern-Driven Traceability of Business Processes Watcharin Uronkarn
More informationEvaluating OO-CASE tools: OO research meets practice
Evaluating OO-CASE tools: OO research meets practice Danny Greefhorst, Matthijs Maat, Rob Maijers {greefhorst, maat, maijers}@serc.nl Software Engineering Research Centre - SERC PO Box 424 3500 AK Utrecht
More informationRS MDM. Integration Guide. Riversand
RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.
More informationInterfacing ISONAS Access Control to an IVC-controlled Video Surveillance System
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.
More informationBusiness Process Modeling Information Systems in Industry (372-1-4207 )
Business Process Modeling Information Systems in Industry (372-1-4207 ) Arnon Sturm The material of this presentation is adopted from various people including:, Pnina Soffer, Iris Reinhartz-Berger 1 Outline
More informationLayered Approach to Development of OO War Game Models Using DEVS Framework
Layered Approach to Development of OO War Game Models Using DEVS Framework Chang Ho Sung*, Su-Youn Hong**, and Tag Gon Kim*** Department of EECS KAIST 373-1 Kusong-dong, Yusong-gu Taejeon, Korea 305-701
More informationMirasys Carbon VCA. Michael Schuh
Mirasys Carbon VCA Michael Schuh 1 Role of Carbon VCA Control center Web client Carbon master Reporting Video-wall Internet Spotter Mobile workstation E.g. access control integr. gateway...... V-series
More informationMasters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
More informationFrom Business World to Software World: Deriving Class Diagrams from Business Process Models
From Business World to Software World: Deriving Class Diagrams from Business Process Models WARARAT RUNGWORAWUT 1 AND TWITTIE SENIVONGSE 2 Department of Computer Engineering, Chulalongkorn University 254
More information1.. This UI allows the performance of the business process, for instance, on an ecommerce system buy a book.
* ** Today s organization increasingly prompted to integrate their business processes and to automate the largest portion possible of them. A common term used to reflect the automation of these processes
More informationLOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
More informationLOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
More informationHow To Design A School Communication System
Integrated School Communications Curt Brautigan East Region Manager, Calypso Systems Seminar Agenda A bit about me (Who is this person talking and where is he from?) Changing dynamics / requirements in
More informationSecurity Center Unified Security Platform
Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly
More informationAnalytics. CathexisVision. CathexisVision Features. Video Management Solutions
Analytics Features Video Management Solutions The Video Analytics Suite provides a powerful enhancement to the world-class, feature-rich Video Surveillance Management software, and significantly enriches
More informationQuestions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements
Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements
More informationDie Mobiliar Insurance Company AG, Switzerland Adaptability and Agile Business Practices
Die Mobiliar Insurance Company AG, Switzerland Adaptability and Agile Business Practices Nominated by ISIS Papyrus Software 1. EXECUTIVE SUMMARY / ABSTRACT The Swiss insurance company Die Mobiliar is the
More informationEvent-based middleware services
3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events
More informationModeling BPMN Diagrams within XTT2 Framework. A Critical Analysis**
AUTOMATYKA 2011 Tom 15 Zeszyt 2 Antoni Ligêza*, Tomasz Maœlanka*, Krzysztof Kluza*, Grzegorz Jacek Nalepa* Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis** 1. Introduction Design, analysis
More informationAXXONSOFT INTRODUCES VERSION OF AXXON INTELLECT ENTERPRISE PSIM
AXXONSOFT INTRODUCES VERSION OF AXXON INTELLECT ENTERPRISE PSIM AxxonSoft has released version 4.9 of Axxon Intellect Enterprise PSIM. The version is focused on new capabilities and features that are taking
More informationSetting the Standard for Safe City Projects in the United States
Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,
More informationCloud Computing: Transformative Technology
Cloud Computing: Physical and Cyber Security s Transformative Technology Cloud Computing: Evolution, not Conventional thinking Innovation Each organization maintains its own Kingdom of IT Keep an expensive
More informationAn Automated Workflow System Geared Towards Consumer Goods and Services Companies
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 An Automated Workflow System Geared Towards Consumer Goods and Services
More informationUsage of Business Process Choreography
Usage of Business Process Choreography Akira Tanaka, Hitachi, Ltd. tanakaak@soft.hitachi.co.jp Infrastructures and Standard 1 Agenda Introduction Lifecycle! Design phase! Usage phase! Managing phase Remarks
More information